Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data exchange
biblio
Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things
Submitted by aekwall on Mon, 02/22/2021 - 12:36pm
iobt
storage resources
Scalability
resource-constrained nodes
Resiliency
pubcrawl
proof of common interest
NDN for IoBT
NDN
named data networking
named data network data-centric approach
IoBT setting
IoBT network
IoBT environment
Human Factors
Internet-of-Battlefield-Things
Internet of Things
internet
immutable trustworthy-distributed ledger feature
Human behavior
electronic data interchange
data privacy
data exchange
computer network security
blockchain technologies
Blockchain for IoBT
IoBT Security
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
digital signatures
secure cloud data communication
Receivers
Quantum Key Distribution
quantum computing
public key cryptography
malicious client
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature
elliptic curve
Elliptic curve cryptography
data exchange
Cryptographic Protocols
Cloud Computing
BB84
authentication
Metrics
Resiliency
Scalability
pubcrawl
biblio
Fuzzy Extractor-Based Key Agreement for Internet of Things
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
secure authentication
Fuzzy Cryptography
transmission data
Reed Solomon codes
recognition rate results
key agreement
IoT actors
fuzzy vault principle
fuzzy extractor-based key agreement
effective key agreement scheme
computation times
Biometric cryptosystem
Hamming codes
fuzzy extractor
Scalability
data exchange
Reed-Solomon codes
biometrics (access control)
sensors
public key cryptography
fuzzy set theory
authentication
Metrics
pubcrawl
Resiliency
feature extraction
Internet of Things
Cryptography
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Common Security Criteria for Vehicular Clouds and Internet of Vehicles Evaluation and Selection
Submitted by aekwall on Mon, 10/19/2020 - 10:45am
intelligent transportation system stakeholders
Vehicular cloud
security selection criteria
security of data
security criteria
Resiliency
pubcrawl
Metrics
Memory
IoT-based smart city
Internet of Vehicles
Internet of Things
Intelligent Transportation Systems
Business
Human Factors
Human behavior
Evaluation and Selection
encryption
data transfer
data privacy
data exchange
cyber physical systems
context-based analysis pattern
computer architecture
cloud-based vehicular cloud
Cloud Computing
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
Modified AES using Dynamic S-Box and DNA Cryptography
Submitted by aekwall on Mon, 06/22/2020 - 10:27am
AES key generation
technological transformations
symmetric algorithms
secured algorithms
secret number generation
modified AES
fast processing
dynamic S-boxes
dynamic S-box
DNA cryptography
Diffie-Hellman key exchange
Diffie-Hellman
attack resistant algorithm
asymmetric algorithms
Cryptography
data exchange
AES
advanced encryption standard
Predictive Metrics
Heuristic algorithms
DNA
privacy
standards
pubcrawl
Human behavior
Resiliency
Conferences
encryption
biblio
Re-envisioning digital architectures connecting CE hardware for security, reliability and low energy
Submitted by aekwall on Mon, 05/04/2020 - 10:07am
personal area networks
data transfer
digital architectures
Local area networks
Low power
low-power components
multiple bridged peripheral links
network architecture
Network of Things
peripheral interfaces
data network architecture
private universal data platform
push-pull data network architecture
scalable switchable data platform
Software Constructed ad-hoc circuit network
ultra-low power data platform
universal peripheral communications links
USB 3.0
USB 3.0 data transfer cables
Ad hoc networks
Hardware
security
Protocols
Software
computer architecture
Resiliency
pubcrawl
privacy
internet
data privacy
electronic data interchange
Network Security Architecture
CE hardware
Consumer Data
consumer electronic systems
Consumer electronics
data connectivity technologies
data exchange
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 11:32am
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
1
2
next ›
last »